CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
2DescriptionNVD
The Sendmachine for WordPress plugin for WordPress is vulnerable to authorization bypass via the 'manage_admin_requests' function in all versions up to, and including, 1.0.20. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for unauthenticated attackers to overwrite the plugin's SMTP configuration, which can be leveraged to intercept all outbound emails from the site (including password reset emails).
AnalysisAI
Authorization bypass in Sendmachine for WordPress plugin (versions ≤1.0.20) allows unauthenticated remote attackers to overwrite SMTP configuration settings without authentication. Attackers can redirect all outbound emails from WordPress sites - including password reset tokens and sensitive communications - to attacker-controlled servers, enabling credential theft and account takeover. …
Sign in for full analysis, threat intelligence, and remediation guidance.
RemediationAI
Within 24 hours: audit all WordPress installations for Sendmachine plugin presence and document version numbers; immediately disable the plugin on all systems. Within 7 days: contact Sendmachine vendor for patch timeline and evaluate alternative SMTP plugins (e.g., WP Mail SMTP Pro, SendGrid for WordPress) for migration planning. …
Sign in for detailed remediation steps.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2026-24700
GHSA-4x86-c4g3-px96